Web as a Distributed System

Similar documents
Transport Level Security

Computer Networks. HTTP and more. Jianping Pan Spring /20/17 CSC361 1

Overview. SSL Cryptography Overview CHAPTER 1

The World Wide Web. Distributed Computing Systems. References. Outline 5/2/2014. The Web. Architecture Processes Caching Web 2.0

Cryptography SSL/TLS. Network Security Workshop. 3-5 October 2017 Port Moresby, Papua New Guinea

Chapter 6: Distributed Systems: The Web. Fall 2012 Sini Ruohomaa Slides joint work with Jussi Kangasharju et al.

Uniform Resource Locators (URL)

Scan Report Executive Summary

Scan Report Executive Summary

Configuring SSL. SSL Overview CHAPTER

Internet applications

EEC-682/782 Computer Networks I

CMPE 151: Network Administration. Servers

13. Databases on the Web

Configuring SSL CHAPTER

HP Instant Support Enterprise Edition (ISEE) Security overview

CS 470 Spring Distributed Web and File Systems. Mike Lam, Professor. Content taken from the following:

Configuring SSL. SSL Overview CHAPTER

CNIT 129S: Securing Web Applications. Ch 3: Web Application Technologies

CS 470 Spring Distributed Web and File Systems. Mike Lam, Professor. Content taken from the following:

Chapter 4: Securing TCP connections

CS 356 Internet Security Protocols. Fall 2013

Transport Layer Security

SEEM4540 Open Systems for E-Commerce Lecture 03 Internet Security

The World Wide Web is widely used by businesses, government agencies, and many individuals. But the Internet and the Web are extremely vulnerable to

Scan Report Executive Summary. Part 2. Component Compliance Summary Component (IP Address, domain, etc.):

Displaying SSL Configuration Information and Statistics

Chapter 2. Application Layer

Distributed Systems Principles and Paradigms. Chapter 12: Distributed Web-Based Systems

Overview Content Delivery Computer Networking Lecture 15: The Web Peter Steenkiste. Fall 2016

Using the Cisco ACE Application Control Engine Application Switches with the Cisco ACE XML Gateway

Application Layer -1- Network Tools

Web technology Guide - Meenakshi M

How to Configure Authentication and Access Control (AAA)

Computer Security. 10r. Recitation assignment & concept review. Paul Krzyzanowski. Rutgers University. Spring 2018

COMPUTER NETWORKS AND COMMUNICATION PROTOCOLS. Web Access: HTTP Mehmet KORKMAZ

Chapter 6: Security of higher layers. (network security)

Cryptography in Lotus Notes/Domino Pragmatic Introduction for Administrators

Computers and Security

SSL/TLS & 3D Secure. CS 470 Introduction to Applied Cryptography. Ali Aydın Selçuk. CS470, A.A.Selçuk SSL/TLS & 3DSec 1

FIPS Management. FIPS Management Overview. Configuration Changes in FIPS Mode

BlackBerry Enterprise Server for IBM Lotus Domino Version: 5.0. Administration Guide

Electronic Mail. Three Components: SMTP SMTP. SMTP mail server. 1. User Agents. 2. Mail Servers. 3. SMTP protocol

Understanding Cisco Cybersecurity Fundamentals

Configuring Secure Socket Layer HTTP

How to Configure SSL VPN Portal for Forcepoint NGFW TECHNICAL DOCUMENT

Configuring Secure Socket Layer HTTP

M.SARAVANA KARTHIKEYAN

CSCE 715: Network Systems Security

Today: World Wide Web! Traditional Web-Based Systems!

Application Layer: OSI and TCP/IP Models

Networks and Communications MS216 - Course Outline -

Assignment - 1 Chap. 1 Wired LAN s

On the Internet, nobody knows you re a dog.

Chapter 32 Security in the Internet: IPSec, SSL/TLS, PGP,

3. WWW and HTTP. Fig.3.1 Architecture of WWW

Security & Privacy. Web Architecture and Information Management [./] Spring 2009 INFO (CCN 42509) Contents. Erik Wilde, UC Berkeley School of

Configuring the CSS for Device Management

Distributed Systems. Fall 2017 Exam 3 Review. Paul Krzyzanowski. Rutgers University. Fall 2017

Deployment Guide AX Series with Oracle E-Business Suite 12

QUICK SET-UP VERIFICATION...3

Foundations of Python

DX Cluster - Specific Configuration and Troubleshooting

Outline. Web browsers & Web servers

HP Load Balancing Module

416 Distributed Systems. March 23, 2018 CDNs

E-commerce security: SSL/TLS, SET and others. 4.1

CSc 450/550 Computer Networks Domain Name System

Chapter 8 Web Security

Configuring Secure Socket Layer HTTP

ICS 351: Today's plan. web scripting languages HTTPS: SSL and TLS certificates cookies DNS reminder

M2-R4: INTERNET TECHNOLOGY AND WEB DESIGN

User Authentication Principles and Methods

A Technical Overview of the Lucent Managed Firewall

[Frequently Asked Questions] Accommodation Booking Website

Introduction and Overview. Why CSCI 454/554?

COSC 301 Network Management. Lecture 15: SSL/TLS and HTTPS

Authenticating on a Ham Internet

CS WEB TECHNOLOGY

Chapter 10 Web-based Information Systems

Scan Report Executive Summary. Part 2. Component Compliance Summary Component (IP Address, domain, etc.):ekk.worldtravelink.com

Security issues: Encryption algorithms. Threats Methods of attack. Secret-key Public-key Hybrid protocols. CS550: Distributed OS.

Overview of SSL/TLS. Luke Anderson. 12 th May University Of Sydney.

Operating Systems Design Exam 3 Review: Spring 2011

Implementing Secure Socket Layer

WAP Security. Helsinki University of Technology S Security of Communication Protocols

BIG-IP Local Traffic Management: Profiles Reference. Version 12.1

SPOOFING. Information Security in Systems & Networks Public Development Program. Sanjay Goel University at Albany, SUNY Fall 2006

Student ID: CS457: Computer Networking Date: 5/8/2007 Name:

Computer Networks. Wenzhong Li. Nanjing University

CS321: Computer Networks FTP, TELNET, SSH

Web Security. Mahalingam Ramkumar

key distribution requirements for public key algorithms asymmetric (or public) key algorithms

HTTPS--HTTP Server and Client with SSL 3.0

Connecting with Computer Science Chapter 5 Review: Chapter Summary:

Performance Implications of Security Protocols

Transport Layer Security

1-1. Switching Networks (Fall 2010) EE 586 Communication and. September Lecture 10

Web, HTTP, Caching, CDNs

TLS 1.1 Security fixes and TLS extensions RFC4346

Transcription:

Web as a Distributed System The World Wide Web is a large distributed system. In 1998 comprises 70-75% of Internet traffic. With large transfers of streaming media and p2p, no longer a majority of bytes, but is in terms of flow. Active area of personal research. Look at my home page for online papers. Proxy Client Content Distribution Server Clients 2nd Level Proxy DNS Servers Server Farms Internet Clients Content Distribution Server Home Users Servers CS 4513 1 week8-webdistsys.tex

E2E Factors and Relevance to Distributed Systems Build up end-to-end performance picture. Basic picture of clients and servers. How DNS and HTTP are used for each object. Static Objects Served from a static file. Similarities with a distributed file system, but differences. much larger scale (number of clients) heterogeneous clients (machine type/operating system) Web generally has single-writer/multiple-reader versus a DFS is concerned about multiple writers. no central administration Composite Objects Pages with embedded objects (images). In the simplest case just make subsequent requests to the same server over separate TCP connections. Browsers use parallel connections to speed up delivery speed. Increasingly obtain objects for a page from a variety of different servers specialized, ad, CDNs Network Protocols Use of HTTP/1.1 for persistent connections (retrieval of multiple objects over the same connection) and pipelining (multiple requests before receiving any replies). When persistence and pipelining works it is better than parallel connections. CS 4513 2 week8-webdistsys.tex

Caches Browser vs. Proxy (depends on shared interests of users). Cache Replacement. LRU, GreedyDual-Size (value divided by size with credit for recent accesses) Cache Coherency. Strong consistency (validate each access, server invalidation like AFS). Weak consistency using a heuristic TTL. Hierarchy of caches. How to should caches work together? DNS Caches local DNS servers handle client requests and recursively resolve names. Cache results based on TTL of response. Server Caches cache content in memory for faster response. Dynamic Content Retrieval is no longer a file retrieval, but a remote procedure call with one or more parameters. Query to a search engine where key words are parameters. Use of cookies, which are pieces of information sent by browser on each request for server to track requests and customize content. Server-side computation is being performed (CGI, JavaScript, ASP (VBScript). May include database access. CS 4513 3 week8-webdistsys.tex

Server Clusters A single server is not enough. Have a farm (cluster) of servers. How to organize? Make it visible to the world or not? HTTP redirection multiple IP addresses for the same server name. a single high-speed switch in front of a group of web servers. Transparent to clients. L4 or L7. Content Distribution Networks How to use them? Talk about Akamai use of DNS. Problems of using DNS to determine client location. What content to store there? How to update? Other Factors Client-side scripts (java applets) distriblet use Secure transactions (SSL) Streaming audio/video content Interaction Between Factors Impact of one factor may be more or less depending on another factor. For example, impact of caching or content distribution network may depend on the HTTP protocol option being used. CS 4513 4 week8-webdistsys.tex

Secure Sockets Layer With increased use of electronic commerce, secure transactions are important. SSL protocol developed by Netscape for encrypted communication between clients and servers. Now it is called Transport Layer Security (TLS) TSL sits between TCP/IP and HTTP layers. Invoked by browsers using the protocol https. Uses public-key cryptography. Features: Clients can authenticate servers through a certificate authority. Important as a client should not send credit card information to an unknown server. Servers can authenticate clients in the same way. Encrypted connection (no plain text). Client initially generates a random number and encrypts it with server s public key (obtained from authentication server). Exchange of messages does the following: authenticate the server to the client allow client and server to select the cryptographic algorithms, or ciphers, they both support. Choices include DES, Digital signature algorithm (DSA), MD5, RSA, RSA key exchange. Most common is RSA key exchange developed for SSL. Optionally authenticate client to the server. Use public-key encryption techniques to generate shared secrets. Establish encrypted SSL connection. CS 4513 5 week8-webdistsys.tex

Additional Directions extraneous content ads web registration measurement of e2e performance potential projects p2p contrast virtualization of servers CS 4513 6 week8-webdistsys.tex